The point where experts and best companies meet
Share
Assists in the development, testing and implementation of security plans, products and control techniques. Coordinates the reporting data security incidents. Provides technical support to client and management and staff in risk assessments and implementation of appropriate data security procedures and products. Executes security controls to prevent hackers from infiltrating company information or jeopardizing e-commerce programs. Researches attempted efforts to compromise security protocols. Administers security policies to control access to systems and maintains the company firewall. Works on problems of moderate scope where analysis of situation or data requires a review of identifiable factors. Exercises judgment within defined procedures and practices to determine appropriate action. Should have increased awareness and exposure to basic technical principles, concepts and techniques. Typically 1-3 years of IT experience.
These jobs might be a good fit